Cyber-Sabotage Continues to Plague RCC Reform

and Accountability Initiative


© 2010 Brad Kempo B.A. LL.B.

Barrister & Solicitor


What the Reform Coalition of Canada will achieve began with the March 2004 commenced Fiefdom treatise research project.  Because the September 2002 filed Federal Court lawsuit was being defended by the Chrétien government using ‘national security’ and ‘injury to international relations’ privilege and thus no documentary disclosure was forthcoming that would explain more about pled systemic malfeasance, the research was undertaken to determine its genesis and the policies and practices that perpetuated it.  The academic undertaking was compromised throughout by the Chinada security apparatus, employing military grade cyber hacking technologies.  And those techniques continue being used to this day. 


Three days after the CSIS Director Richard Fadden dropped the foreign spy bombshell, an e-mail was sent to all RCC invitees; and in it was also a reference to the submission on the systemic wealth misappropriation issue:


June 24, 2010 

Attention: Reform Coalition of Canada Invitee


For those who didn't watch or hear about RCC-relevant news over the last three days, CSIS Director Richard Fadden was interviewed by CBC's Peter Mansbridge – airing Monday, June 21st – that was immediately perceived by political leaders, elected officials, academics, the media and others as unprecedented and controversial.  


Globe & Mail: Government infiltrated by spies, CSIS boss says


Toronto Star: Canadian politicians accused of being under control of foreign governments 


This intended 'bombshell' was pursuant to what is documented at; and was timed to coincide with the arrival of China's Premier and to trigger discussion and debate during the G8/G20 Summits. 


As importantly, for RCC interests and objectives what Director Fadden did is in many ways parallel to Auditor General Sheila Fraser's report that led to the Liberal sponsor scandal and the party's loss of the January '06 election after 13 years of uninterrupted government.  Your respective executives are encouraged to expedite your due diligence and decision to become a member of the coalition that will effect the national awareness campaign concerning Chinese joint governance, economy monopolization and wealth misappropriation.


Being a career civil servant and working in federal departments relevant to these matters, i.e., Foreign Affairs, Citizenship and Immigration and esp. the Privy Council Office, Director Fadden carefully strategized this initiative with his inner core of colleagues.  He accurately predicted what his accusations would produce in terms of political, media and academic reaction.  He already has his rebuttal prepared to address his critics, like presenting the evidence that substantiates his claims.  Some of that proof is in his possession and the rest is posted on the RCC website. 


With respect to last week's posting "Who Benefits What from Regime Change in Canada",, if anyone wants to submit comments on it or knows of an economist or business analyst who will substantiate the evidence about 25 years of wealth misappropriation, let me know. It will be valuable in terms of RCC recruitment, triggering outrage during the national awareness campaign and bringing an end to the old guard and China's grip on government, the security apparatus and the economy.   


As per usual, if you have any questions or require elucidation on any matter, don't hesitate to contact me.


Kindly acknowledge receipt of this e-mail for our records.   

Best regards, 

Brad Kempo B.A. LL.B.

Barrister & Solicitor [Alberta, Inactive]



As has been the case since the commencement of the edification campaign in August 2007, recipients were asked to confirm receipt – as much to have a record of delivery as to track how much cyber-sabotage was being used to frustrate the reform and accountability initiative, because since the commencement of the research project all manner of hacking and electronic interference was experienced.  It really wasn’t surprising that of 250 or so e-mails sent on June 24th, not one – not one – confirmation of delivery was received.  This was due to (i) some of them being prevented from reaching their intended destination and (ii) for the ones that did, acknowledgments were prevented from reaching the RCC founder’s e-mail inbox. 



The first time he observed remote interference of his computer was late August 2004.  After discovering The Sidewinder Report earlier that month and beginning what would become a five-month investigation of its significance, the Chinada security apparatus went into high gear harassing him into halting his academic and litigation-relevant inquiry.  Concomitant with security apparatus operatives employing an in-your-face stalk, swarm, surround methodology of intimidation every single time he left his home-office and using techniques to invade his privacy in his residence 24.7.365, was cyber-sabotage after implanting spy ware, Trojan horses and other malware on his computer through his Internet connection.  All this unlawful activity fell into the category of what lawyers call ‘guilty conscience evidence’.  This is an element of proof in the law of evidence.  It comes into play when an accused for examples flees the scene, destroys or hides evidence or threatens witnesses, etc..  The activity seeks to prevent justice from being done.  For more explanation see section V in the RCC chapter Academic Methodologies and Terminology. As was argued in a Fiefdom treatise chapter “this interference proves that what was being researched and then discovered was meritorious; otherwise why would the malfeasant parties bother”.  


Canada’s Security Apparatus Breaks Criminal Code Prohibition

on Interfering with and Sabotaging the Internet 

© 2008 Brad Kempo B.A. LL.B.

Barrister & Solicitor


The Criminal Code of Canada prohibits the interference with and theft of communications; that includes the Internet and e-mails.  But that’s precisely what DND, CSIS, police and the Chinese military have learned to do so they can control, manipulate, disrupt and sabotage personal, corporate and official exchanges between Canadians to protect and strengthen what the Fiefdom indictment itemizes.   

Interception of Communications


183. "private communication" means any oral communication, or any telecommunication, that is made by an originator who is in Canada or is intended by the originator to be received by a person who is in Canada and that is made under circumstances in which it is reasonable for the originator to expect that it will not be intercepted by any person other than the person intended by the originator to receive it,


"intercept" includes listen to, record or acquire a communication or acquire the substance, meaning or purport thereof;


184. (1) Every one who ... wilfully intercepts a private communication is guilty of an indictable offence and liable to imprisonment for a term not exceeding five years. 




322. (1) Every one commits theft who fraudulently and without colour of right takes, or fraudulently and without colour of right converts to his use or to the use of another person, anything, whether animate or inanimate, with intent  

(a) to deprive, temporarily or absolutely, the owner of it…


The country’s security apparatus made a habit of disrupting the Canadian lawyer’s use of the Internet and prevented e-mails and attachments to e-mails from arriving at their intended destinations enough times to conclude that a whole series of technologies, techniques, strategies and tactics were developed with the help of the Chinese military; ones that threaten not only the interests of our citizens, but also tens of millions of unaware people and a plethora of governments and corporations throughout the world that assist Beijing’s march towards global hegemony.  




In mid-2004 the security apparatus inundated his hard drive with hundreds of megabytes of meaningless data through the then dial-up Internet connection – or entered his apartment when away and downloaded them, causing it to crash irreversibly and requiring a new one.  That attack was perceived as malicious retaliation for aggressively prosecuting the Federal Court lawsuit and conducting Fiefdom treatise research.


Over the years, he’s witnessed the ability to seize up and crash the computer, stop files from being saved to disc and shutting off and turning on the “auto spell check” and “auto correct” functions.  Lately, he’s experience them manipulating and blocking his ability to search files on the hard drive.  

Now one can add five more kinds of remote manipulation:   


(i)                  Suspend the copy-paste function – not being able to capture the intended text so it can be transferred from one place on the page to another or from one document to another;


(ii)                Fill the screen with dozens of unwanted windows;


(iii)               Manipulate the tab command;


(iv)              Initiate the ‘insert’ command, which has the effect of eliminating type as one adds text to a document; and

(v)                Alter highlighted text selected for elimination or amendment. 


The ramifications are immense.  For not only is every home computer vulnerable to covert surveillance and data disruption and destruction (the latter two perceived by victims as the result of standard hardware and software deficiencies), the same security loopholes that create opportunity for illegality (theft, manipulation, erasure) exists for government and military computers, corporate systems that contain trade secrets and lawyer and medical databases with sensitive client and patient privileged information.


When he got his high speed Internet service in December 2006, almost immediately his streaming video capabilities were being toyed with – cut, slowed down, chopped up into jerky segments and audio and video decoupled; just what you’d expect from pubescent sociopaths running the country’s government and security apparatus.  Each time it happened for the first few months he contacted his Internet Service Provider to create a paper trail of complaints; always being told that a diagnostic revealed everything was fine from the ISP’s end and nothing could be done if disruptions were being caused somewhere external to their servers and along the Internet pipe.  


The illegalities took on a different and just as ominous form on March 13th, 2008.  [During the edification campaign] [t]wo Fiefdom treatise recipients advised him they did not receive an e-mail.  It happened again on March 18th but this time one of several supplementals wasn’t received.  The content of the deleted attachment was very embarrassing to Beijing’s leaders and those in Canada complicit with and loyal to them: Taking a Close, Hard Look at China’s Domestic and Foreign Policies: Facts and Parallels That Ought to Add to Your Shock, Outrage and the Threat You Should Feel About Living in Chinada.  What this sabotage incident revealed is the ability to halt an e-mail en route, remove an attachment and let the rest go through. 


To demonstrate not only complete mastery of Internet sabotage but that now all-too familiar arrogance of power, an April 30th e-mail was disrupted; not getting through to some recipients.  Here are the results of two requests for confirmation of receipt:


Fwd: from Brad Kempo

From: Mike AUBRY (

Sent: May 1, 2008 5:47:03 PM




Mr. Kempo, further to your inquiry I did receive both e-mails [on April 22 and April 30] with their attachments.

Mike Aubry, Supt.OIC, Employee and Management Relations

Section "E" Division 


An assistant to the Lieutenant Governor of British Columbia by contrast indicated the April 22nd was received, but nothing on April 30th:  


From: Brad Kempo []

Sent: Tuesday, April 22, 2008 9:54 AM

To:;;;;;;;;;;; Fortin, Chantelle FIN:EX


Subject: from Brad Kempo



Attention: Lieutenant Governors 

Re: Three Supplementals 

Please find attached the following for your immediate attention … 


RE: from Brad Kempo

From: Fortin, Chantelle FIN:EX (

Sent: May 1, 2008 3:38:23 PM

To:  Brad Kempo (


This is the last one that I have received. 




These capabilities by the country’s sociopathic security apparatus have major local, regional, national and global implications.  In the domestic economic sphere of activity, this interference, disruption and sabotage is useful in economy monopolization because business owners not linked to the triangle of power and wealth have been and in the future will be deprived of critical and time-sensitive information on which to make important corporate decisions – providing serial criminals in power or linked to them not otherwise available advantages and benefits to advance their corporate and entrepreneurial interests.  In the highly competitive marketplace, the delay of or a non-delivered message can mean the difference between meeting a deadline or not, getting something accomplished or not or exploiting an opportunity or losing it to a competitor. 


Not only ordinary Canadians have been and will in the future be victims, but being exportable, unsuspecting foreigners around the world who seek to do business with Canada or China’s rich and powerful will be sucked into a false sense of confidence their basic rights are be respected, when in fact they’ll be clandestinely sucker punched at every turn.  


The proliferation of these capabilities has serious international ramifications.  Strategic corporate, financial, stock market and competition interests of the super-wealthy and multinational corporations all are now subject to transmission delay, information manipulation and theft. 



When the edification campaign was extended to the private sector in November 2009 (see list of recipients in first contact was made with the National Bank of Canada on November 27th.  Linda Caty, Vice-President & Corporate Secretary was sent an e-mail through her secretary Francesca, attached to which was the RCC website’s Introductory Correspondence.  The matter eventually reached the desk of Dominic Paradis, Sr. Manager of the Legal Department.  He advised, as this e-mail confirms, the attachment didn’t arrive:




Make a Free Website with Yola.